Static task
static1
Behavioral task
behavioral1
Sample
2024-09-25_c0594ba58460846646c9de738937d91a_bkransomware.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
2024-09-25_c0594ba58460846646c9de738937d91a_bkransomware.exe
Resource
win10v2004-20240802-en
General
-
Target
2024-09-25_c0594ba58460846646c9de738937d91a_bkransomware
-
Size
6.6MB
-
MD5
c0594ba58460846646c9de738937d91a
-
SHA1
83fa458a79a3d8779ec203db1ba056f4c34ed8b2
-
SHA256
5151fab885c34f527ce9c4402e4e990392c73e7e3082ae5d58e1e47983dbe30e
-
SHA512
0e794bc8fa5fc05156047b4fe8d3c5573c2ac8ece6cfdea5cf3d7830317e3c79d0320062c523737cc92dc8edec0e2f658a8e205cf97d0933112730415c8350e1
-
SSDEEP
196608:DlmqGQGddH4fmnAzAR+27+6xe2PAgjIc0TIe:0QG7HnAkzTs2PtEs
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2024-09-25_c0594ba58460846646c9de738937d91a_bkransomware
Files
-
2024-09-25_c0594ba58460846646c9de738937d91a_bkransomware.exe windows:6 windows x86 arch:x86
473e84ba12b0c2033429e8d1dd30d284
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
LCMapStringW
UnregisterWaitEx
QueryDepthSList
InterlockedFlushSList
InterlockedPushEntrySList
InterlockedPopEntrySList
ReleaseSemaphore
VirtualProtect
VirtualFree
VirtualAlloc
GetVersionExW
GetModuleHandleA
FreeLibraryAndExitThread
OutputDebugStringW
FreeEnvironmentStringsW
WriteFile
GetFileType
GetStdHandle
IsDebuggerPresent
GetProcessHeap
HeapAlloc
HeapSize
WideCharToMultiByte
UnregisterWait
RegisterWaitForSingleObject
SetThreadAffinityMask
GetProcessAffinityMask
GetNumaHighestNodeNumber
DeleteTimerQueueTimer
CreateTimerQueueTimer
GetLogicalProcessorInformation
GetThreadPriority
SetThreadPriority
SwitchToThread
SignalObjectAndWait
SetEvent
CreateTimerQueue
HeapFree
ExitThread
CreateThread
CreateSemaphoreW
GetProcAddress
GetModuleHandleW
GetTickCount
GetStartupInfoW
TlsSetValue
TlsGetValue
SetLastError
SetUnhandledExceptionFilter
UnhandledExceptionFilter
RtlUnwind
GetCommandLineW
HeapReAlloc
GetLastError
DecodePointer
EncodePointer
LeaveCriticalSection
EnterCriticalSection
GetSystemTimeAsFileTime
GetExitCodeThread
GetCurrentThreadId
GetCurrentThread
GetCurrentProcess
DuplicateHandle
CloseHandle
GetStringTypeW
GetConsoleCP
GetConsoleMode
SetFilePointerEx
LoadLibraryW
SetStdHandle
VirtualQuery
WriteConsoleW
ExpandEnvironmentStringsW
TlsFree
OpenFileMappingA
GetThreadTimes
TlsAlloc
FindNextFileW
FindNextFileA
CreateEventW
GlobalFree
IsValidCodePage
IsDBCSLeadByteEx
RaiseException
FlushFileBuffers
GetACP
GetOverlappedResult
GetModuleFileNameW
TerminateProcess
CreateProcessA
MulDiv
Beep
IsProcessorFeaturePresent
GetSystemTimeAdjustment
Sleep
InitializeCriticalSectionAndSpinCount
OpenProcess
GetWindowsDirectoryA
ExpandEnvironmentStringsA
WaitForSingleObjectEx
SetCommBreak
WaitForSingleObject
GetModuleHandleExW
QueryPerformanceCounter
SetEnvironmentVariableW
InitializeSListHead
WaitNamedPipeA
LoadLibraryExW
GetCPInfo
UnmapViewOfFile
MapViewOfFile
GetLocaleInfoA
GlobalMemoryStatus
GetEnvironmentVariableW
ExitProcess
GetFileAttributesA
FreeLibrary
GetSystemTime
GetCurrentProcessId
DeleteCriticalSection
GetOEMCP
LoadLibraryA
FindClose
GlobalUnlock
MultiByteToWideChar
GetTimeZoneInformation
GetCommandLineA
ConnectNamedPipe
SetHandleInformation
GetEnvironmentStringsW
GetCommState
SetEndOfFile
ChangeTimerQueueTimer
CreateFileW
user32
SetCursor
EndPaint
ShowOwnedPopups
DestroyAcceleratorTable
SetWindowRgn
SetTimer
GetWindowRect
CreateDialogParamA
GetMessageW
TrackPopupMenu
SetCapture
IsZoomed
DeleteMenu
GetParent
MessageBeep
CreateMenu
DrawEdge
ShowCaret
BeginPaint
CreateIconIndirect
WaitMessage
GetQueueStatus
GetKeyboardState
CreateDialogIndirectParamA
GetWindowPlacement
GetWindowTextA
SetRect
CheckMenuRadioItem
SetWindowLongA
GetScrollInfo
MessageBoxA
UnionRect
UnregisterClassA
PeekMessageA
DrawStateW
GetDlgItem
ScrollWindow
EndDialog
SetWindowsHookExA
RedrawWindow
ShowWindow
DrawMenuBar
AppendMenuA
IsWindow
PostMessageA
FlashWindow
CreateWindowExW
MessageBoxW
ReleaseCapture
GetSystemMetrics
SetCaretPos
SetWindowTextA
SendMessageW
UpdateWindow
LoadCursorA
DialogBoxParamA
GetCaretBlinkTime
ToUnicode
DestroyIcon
DrawFrameControl
SetScrollInfo
TranslateMDISysAccel
GetMessageA
CopyRect
ToAsciiEx
PostQuitMessage
SendDlgItemMessageA
LoadStringA
RemovePropA
EnumWindows
GetDC
ShowCursor
GetWindowLongA
EnableMenuItem
DefWindowProcA
DestroyCursor
GetDesktopWindow
GetSysColor
CheckDlgButton
SetMenu
EnableScrollBar
CreateCaret
RegisterClassW
InsertMenuA
ValidateRgn
DestroyMenu
ValidateRect
CheckMenuItem
GetWindowThreadProcessId
IsRectEmpty
gdi32
SetViewportOrgEx
LineTo
ExtFloodFill
DeleteDC
StretchBlt
GetDIBits
SetDIBColorTable
ExcludeClipRect
CreateHalftonePalette
GetRgnBox
GetEnhMetaFileHeader
CreatePalette
GetRegionData
GetPaletteEntries
CreatePenIndirect
CreateCompatibleDC
PolyPolyline
CreateRectRgnIndirect
CombineRgn
CreateCompatibleBitmap
RealizePalette
GetTextExtentPointW
GetCurrentPositionEx
GetObjectW
GetCharABCWidthsW
SetStretchBltMode
GetWindowOrgEx
GetCharWidth32A
GetTextExtentPointA
GetCharABCWidthsFloatA
CreatePatternBrush
CreatePen
GetClipBox
SetViewportExtEx
RectVisible
CreateDIBitmap
EndDoc
GetStockObject
SetWinMetaFileBits
CreateEnhMetaFileW
GetObjectType
GetBitmapBits
MoveToEx
SetLayout
BitBlt
GetTextExtentPoint32A
SetTextColor
MaskBlt
Polygon
CreateFontA
GetDeviceCaps
SetBkColor
SelectClipRgn
CreateBrushIndirect
SaveDC
CreateBitmapIndirect
GetDIBColorTable
GetPixel
SetWindowOrgEx
ExtCreatePen
CreateRectRgn
Ellipse
advapi32
EqualSid
GetUserNameA
RegOpenKeyExW
SetSecurityDescriptorOwner
RegDeleteKeyA
RegCloseKey
GetLengthSid
SetSecurityDescriptorDacl
shell32
ShellExecuteExW
Sections
.text Size: 633KB - Virtual size: 632KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 6.0MB - Virtual size: 6.0MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 8KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.Cbn Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 13KB - Virtual size: 13KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ